Home
last modified time | relevance | path

Searched refs:image_src (Results 1 – 4 of 4) sorted by relevance

/trusted-firmware-a-3.4.0/bl1/
Dbl1_fwu.c30 uintptr_t image_src,
35 uintptr_t image_src,
225 uintptr_t image_src, in bl1_fwu_image_copy() argument
262 if ((image_src == 0U) || (block_size == 0U) || in bl1_fwu_image_copy()
263 check_uptr_overflow(image_src, block_size - 1)) { in bl1_fwu_image_copy()
332 if (bl1_plat_mem_check(image_src, block_size, flags) != 0) { in bl1_fwu_image_copy()
353 (void)memcpy((void *) dest_addr, (const void *) image_src, block_size); in bl1_fwu_image_copy()
368 uintptr_t image_src, in bl1_fwu_image_auth() argument
412 if ((image_src == 0U) || (image_size == 0U) || in bl1_fwu_image_auth()
413 check_uptr_overflow(image_src, image_size - 1)) { in bl1_fwu_image_auth()
[all …]
/trusted-firmware-a-3.4.0/docs/security_advisories/
Dsecurity-advisory-tfv-4.rst78 uintptr_t image_src,
83 ``image_src`` is an SMC argument and therefore potentially controllable by an
85 sum of ``image_src`` and ``block_size`` overflowing a 32-bit type, which
100 uintptr_t image_src,
104 Similarly, if an attacker has control over the ``image_src`` or ``image_size``
Dsecurity-advisory-tfv-1.rst79 if (bl1_plat_mem_check(image_src, block_size, flags)) {
89 memcpy((void *)base_addr, (const void *)image_src, block_size);
105 if (bl1_plat_mem_check(image_src, block_size, flags)) {
123 memcpy((void *)base_addr, (const void *)image_src, block_size);
/trusted-firmware-a-3.4.0/docs/getting_started/
Dporting-guide.rst1467 Argument : unsigned int image_id, uintptr_t image_src,